Index_C


C

Cache folders, 280

California:

anti-stalking law, 599

Penal Code, 600

California v. Greenwood, 53–4

Caller-ID, 101

systems, 391

Canada:

Criminal Code in, 26, 365

Section 206 (1) b, 4

Pecciarich case, 179

Cardinfo command, 341–2

Cards4Labs, 29, 354

Carnivore, 29, 429

Case:

involving digital evidence, proper evidence handling, 186

management, 102

and incident resolution process, overview of, 92

Casey's Certainty Scale, 173–4

Cassidy case, 478

Catalog, 297, 323

record, 326

Categories:

of cybercrime, 221

of investigative process model, 101–3

CDMA (Code Division Multiple Access), 369–70

CDPD (Cellular Digital Packet Data), 369

Cell sites, 368

Cellular networks, 368

Cellular phones, 35, 337, 369, 442, 600

Certainty Scale, 2, 176, 183, 186, 250

advantages, 177

Certainty values (C-values), 176

Chain of custody of evidence, 106, 185

maintaining and documenting, 169–70

Chat rooms, 42, 50, 128, 152, 378

Chat Monitor, 18, 513

Checksum, 110, 422

Child abuse, 11, 83, 163, 378

cases, 568

on the Internet, 481

Child exploitation investigation, problems, 496

Child abusers, 49

networks of, 564

Child Online Protection Act (COPA), 47–8

Child pornographers, study of, 565

Child pornography, 9, 13–14, 18, 26, 35, 37, 49–50, 65, 69–72, 100, 117, 134, 152, 170–1, 178, 214, 230, 239, 244, 252, 286, 356, 383, 386, 392, 479, 485, 563, 571, 574, 576, 579, 585

on the Internet, 481

motivation, 585

penalties, 80, 82

US law, 568–9

Child Pornography Prevention Act (CPPA), 49–50

Child Protection and Obscenity Enforcement Act, 49

Child Protection Restoration and Penalties Enforcement Act, 49

Child Sexual Abuse and Pornography Act, 49

Chunk, 339

Circuit-switched networks, 443

Cisco, 362, 424

fire-wall, 393

Private Internet eXchange (PIX) firewall, 400, 469

routers, 392

Citibank case, 75, 79

Class characteristics, 97–8

individual characteristics of data, 113, 230–7

Classification

comparison, and evaluation of source, 539–40

offenders, 159

offense behaviors, 159

Climate-controlled room, 223

Clinton, US President, 33

Cloned cellular phones, 36

Clusters, 201, 205

CMOS (Complementary Metal Oxide Silicon):

configuration tool, 196

microchip, 197

CNID (Catalog node ID), 323

COE Convention of Cybercrime, 75

Collateral victims, 662

Collection of digital evidence, 1–3, 14, 20, 116–17, 220–8

application layer, 477

in computer networks, 29

sector-by-sector, 261

cybertrails, 359, 391, 393, 417, 489, 517, 600, 610, 617

data-link layer, 374, 420

empirical law, 226

entire computer, 225, 630

guidelines, 628

hardware, 222–5

information needed, 225

Internet evidence, 132

intrusion investigations, 100, 117, 120

network layer, 375

network traffic using sniffer, 428

options, advantages and disadvantages of, 228

portion of computer contents, 631

precautions with suspects, 225, 571, 592

preservation, 220–8

Columbia Space Shuttle crash, 383

Commerce Clause of the United States Constitution, 567

Commercial systems, digital evidence on, 19

Commercial Web proxies, 497

Common languages, 370–81

Common Law:

criminal law enforcement, 567

"Right of Privacy", 51

Communication systems, 12, 21

Communications Decency Act (CDA), 46–7

Community standards issues, 46

Compact disk, digital evidence storage, 630

Compaq, 403

Compensatory (power reassurance) behavior, 159–60, 671

Component theft, 25

Computer/s:

basic operation of, 195–9

basics for digital evidence examiners, 191

brief history of, 191–5

cracker, 666

crime, 667

definition of, 30

investigation, history and terminology of, 25–6

forensics, 31

intruders:

method of approach and attack, 544

operation of, 522–6

intrusions:

detailed case example, 554

and fraud, 25

investigating, 521

logon record, 179

material, unauthorized modification of, 75–6

misuse, 72–6

in America, 62–5

networks, brief history of, 360

role in crime, 31

security professionals, 93

virus, 165

Computer Abuse Act, (UK), 26, 30

Computer Assistance Law Enforcement Act (CALEA) (US), 38

Computer based evidence, good practices guide, 107

Computer Fraud and Abuse Act (CFAA), (US), 26, 30, 62–3, 75, 452

Computer Misuse Act, 72, 76, 78–9

Criminal Justice Act, (UK), 70, 568

Criminal Justice and Court Service Act (UK), 80

Computer-related crime, four categories, 32

Concentrator see Hubs

Confidential and/or illicit materials, broad dissemination of, 151

Connectedness, 148

Connecticut State Crime Lab, 593

Connecticut v. Sorabella, 582

Connection management, 450–4

Connectionless Network Protocol (CLNP), 371

Constellations of similar characteristics, 234

Content Scrambling System (CSS), 60

Continuity of offense, 572

potential sources of evidence for, 100

Contraband hardware, 34–6

Contraband information, 14, 35, 37

Convention on Extradition, 78

Cookie files, 280, 332

COPA see Child Online Protection Act

Copernic, 492

COPINE, 481

Copying digital evidence:

backup copies, 203, 292

bitstream copy, 294, 395, 397, 419

entire computer, 225, 630

labeling of copies, 397, 628

sector-by-sector, 261

Copyrights:

background, 57–8

law, 57

and the "theft" of digital intellectual property, 57–62

Copyright Act, 58, 60–1

Copyright Term Extension Act, 57

Corpus delicti, 118, 120, 667

CORPX domain, 459

Cotton gin, 148

Council of Europe Convention on Cybercrime, 67

Court of Appeals, 48–9, 61

CPPA see Child Pornography Prevention Act

CPU (Central Processing Unit), 195

Crackers, computer, 216, 663

password, 270

profiles of, 541

Credit cards, 19

Credit institutions, 37

unauthorized access to records from, 30

Crime:

on the Internet, 17

reconstruction, 663

Crime scene:

characteristics, 129–33, 544–9, 663

with multiple locations on the Internet, 128–9

spread around world on personal computers and servers, 129

type, 663

Criminals:

activity on the Internet, 517

applications of viruses, 165

motive, 158

MO, 150

and specific virtual spaces, 131

Criminal Damage Act, 76

Criminal defense attorneys and experts, 4

Criminal Justice and Public Order Act, 70

Cryptography, 208

CryptoPad, 353

CSMA/CD (Carrier Sense Multiple Access with Collision Detection), 366, 422

C-Scale see Certainty Scale

Ctime, 294

Current Technologies, 165

Cyberpanic, 30, 149, 663

Cyberspace, 667

Cyberstalker, 19

case example, 612–14

escalation and violence, 605

MO and signature bahaviors, 610

operation of, 600–3

Cyberstalking, 599, 663

investigating interviews, 606

investigating stages, 605–11

investigation:

crime scene characteristics, 610–11

motivation, 611

risk assessment, 605, 607–8

search, 608–10

victimology, 605, 607–8

Cybertrail, 17–20, 671

challenging aspects of, 20

Cylinder, 200

Cypherpunk, 499




Digital Evidence and Computer Crime
Digital Evidence and Computer Crime, Second Edition
ISBN: 0121631044
EAN: 2147483647
Year: 2003
Pages: 279

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net